RE: extend validity of existing certificates

2003-02-17 Thread Markus Lorch
 
 On my little system I've three types of self created certificates that
 will all expire this year (I didnt pay much attention to expiration
 when first creating them).
 
 I'm now looking for a way how to extend this validity without 
 recreating the
 certificates and therefore breaking existing trust-relation.

There is no way to extend certificate validity (other than chaning your
computer clock - not recommended) but you can issue a new certificate
with
the same keypair used originaly (standard procedure for renewal)

but because you maintain the keys you are not breaking any trust
relations

 
 i) my CA. I have the key-file and the crt-file.
   If I need to recreate this I need to recreate and resign all
 certificates of type ii) also and I'll need to redistribute the new CA
 to all clients that have this cert installed.

only the cert file needs recreation and yes, all the clients will have
to 
have the new cert (watch out to use the same subject as well, i.e.
create a
new, identical certificate that only differs in the validity and serial
number)

 
 ii) the certificates signed by the above CA. This are mostly 
 certificates
 for virtual hosts with my apache. I've the key-file and the 
 crt-file and even the csr-file.
 

none of these need to be recreated because of the new CA certificate,
however
if these certs expire themselves then you also need to renew them. Same
as before,
only the certs need renewal - key pairs can be maintained  

 iii) selfsigned certificates I use for securing mailtransfer. 
 I have the pem-file in this case.

same as above, create a new cert but maintain the key. But actually you
can 
simply reuse you expired cert as they are self-signed, you (and nobody
else) 
trusts your certs. All the trust is directly in your public-private key
pair.
 
 I hope that I can extend the validity with openssl without
 recreating. 
 

nope, that's what makes certificates safe. 

Markus
 


 
 thnx,
 peter
 
 -- 
 mag. peter pilsl
 IT-Consulting
 tel: +43-699-1-3574035
 fax: +43-699-4-3574035
 [EMAIL PROTECTED]
 http://www.goldfisch.at
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: extend validity of existing certificates

2003-02-17 Thread Hotmail
It is not true, because it is possible to extend the validity of a
certificate, even with openssl.

You have to create a new certification request, with an extended period of
time.

Rossi


- Original Message -
From: Markus Lorch [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, February 17, 2003 3:10 PM
Subject: RE: extend validity of existing certificates


 
  On my little system I've three types of self created certificates that
  will all expire this year (I didnt pay much attention to expiration
  when first creating them).
 
  I'm now looking for a way how to extend this validity without
  recreating the
  certificates and therefore breaking existing trust-relation.

 There is no way to extend certificate validity (other than chaning your
 computer clock - not recommended) but you can issue a new certificate
 with
 the same keypair used originaly (standard procedure for renewal)

 but because you maintain the keys you are not breaking any trust
 relations

 
  i) my CA. I have the key-file and the crt-file.
If I need to recreate this I need to recreate and resign all
  certificates of type ii) also and I'll need to redistribute the new CA
  to all clients that have this cert installed.

 only the cert file needs recreation and yes, all the clients will have
 to
 have the new cert (watch out to use the same subject as well, i.e.
 create a
 new, identical certificate that only differs in the validity and serial
 number)

 
  ii) the certificates signed by the above CA. This are mostly
  certificates
  for virtual hosts with my apache. I've the key-file and the
  crt-file and even the csr-file.
 

 none of these need to be recreated because of the new CA certificate,
 however
 if these certs expire themselves then you also need to renew them. Same
 as before,
 only the certs need renewal - key pairs can be maintained

  iii) selfsigned certificates I use for securing mailtransfer.
  I have the pem-file in this case.

 same as above, create a new cert but maintain the key. But actually you
 can
 simply reuse you expired cert as they are self-signed, you (and nobody
 else)
 trusts your certs. All the trust is directly in your public-private key
 pair.
 
  I hope that I can extend the validity with openssl without
  recreating.
 

 nope, that's what makes certificates safe.

 Markus



 
  thnx,
  peter
 
  --
  mag. peter pilsl
  IT-Consulting
  tel: +43-699-1-3574035
  fax: +43-699-4-3574035
  [EMAIL PROTECTED]
  http://www.goldfisch.at
  __
  OpenSSL Project http://www.openssl.org
  User Support Mailing List[EMAIL PROTECTED]
  Automated List Manager   [EMAIL PROTECTED]
 

 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: extend validity of existing certificates

2003-02-17 Thread Markus Lorch
 
 
 It is not true, because it is possible to extend the validity of a
 certificate, even with openssl.

I'd be really curious how you accomplish this, other than the solution
below ... which creates a new cert request which becomes a new cert
after the cert request has been signed

I.e. a PKC is a signed construct, if you change anything within the
construct
(i.e. the validity) you have to create a new signature and thus have a
new
certificate that is != to the old one. The only thing you can (and want
to)
keep is the key pair.

 
 You have to create a new certification request, with an 
 extended period of
 time.
 
 Rossi
 
 
 - Original Message -
 From: Markus Lorch [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Monday, February 17, 2003 3:10 PM
 Subject: RE: extend validity of existing certificates
 
 
  
   On my little system I've three types of self created 
 certificates that
   will all expire this year (I didnt pay much attention to 
 expiration
   when first creating them).
  
   I'm now looking for a way how to extend this validity without
   recreating the
   certificates and therefore breaking existing trust-relation.
 
  There is no way to extend certificate validity (other than 
 chaning your
  computer clock - not recommended) but you can issue a new 
 certificate
  with
  the same keypair used originaly (standard procedure for renewal)
 
  but because you maintain the keys you are not breaking any trust
  relations
 
  
   i) my CA. I have the key-file and the crt-file.
 If I need to recreate this I need to recreate and resign all
   certificates of type ii) also and I'll need to 
 redistribute the new CA
   to all clients that have this cert installed.
 
  only the cert file needs recreation and yes, all the 
 clients will have
  to
  have the new cert (watch out to use the same subject as well, i.e.
  create a
  new, identical certificate that only differs in the 
 validity and serial
  number)
 
  
   ii) the certificates signed by the above CA. This are mostly
   certificates
   for virtual hosts with my apache. I've the key-file and the
   crt-file and even the csr-file.
  
 
  none of these need to be recreated because of the new CA 
 certificate,
  however
  if these certs expire themselves then you also need to 
 renew them. Same
  as before,
  only the certs need renewal - key pairs can be maintained
 
   iii) selfsigned certificates I use for securing mailtransfer.
   I have the pem-file in this case.
 
  same as above, create a new cert but maintain the key. But 
 actually you
  can
  simply reuse you expired cert as they are self-signed, you 
 (and nobody
  else)
  trusts your certs. All the trust is directly in your 
 public-private key
  pair.
  
   I hope that I can extend the validity with openssl without
   recreating.
  
 
  nope, that's what makes certificates safe.
 
  Markus
 
 
 
  
   thnx,
   peter
  
   --
   mag. peter pilsl
   IT-Consulting
   tel: +43-699-1-3574035
   fax: +43-699-4-3574035
   [EMAIL PROTECTED]
   http://www.goldfisch.at
   
 __
   OpenSSL Project 
 http://www.openssl.org
   User Support Mailing List  
   [EMAIL PROTECTED]
   Automated List Manager   
 [EMAIL PROTECTED]
  
 
  
 __
  OpenSSL Project 
 http://www.openssl.org
  User Support Mailing List
 [EMAIL PROTECTED]
  Automated List Manager   
 [EMAIL PROTECTED]
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: extend validity of existing certificates

2003-02-17 Thread pilsl

Thnx a lot for your detailed answer.

 I already started following your recommandations and created a new
CA.crt based on the given old ca.key and also created a new CSR
(also based on its old key) and signed it with the new CA to get a
new CRT.

The new CRT is perfectly accepted by all clients (webbrowsers) even if
they have the old CA.CRT installed.
So I've time to distribute the new CA.CRT until the old CA.CRT expires.

I tested this scenario by chaning clock of some clients. IE5.5 will
then claim, that the certificate itself has expired ..

thnx again,
peter

On Mon, Feb 17, 2003 at 09:10:39AM -0500, Markus Lorch wrote:
  
  On my little system I've three types of self created certificates that
  will all expire this year (I didnt pay much attention to expiration
  when first creating them).
  
  I'm now looking for a way how to extend this validity without 
  recreating the
  certificates and therefore breaking existing trust-relation.
 
 There is no way to extend certificate validity (other than chaning your
 computer clock - not recommended) but you can issue a new certificate
 with
 the same keypair used originaly (standard procedure for renewal)
 
 but because you maintain the keys you are not breaking any trust
 relations
 
  
  i) my CA. I have the key-file and the crt-file.
If I need to recreate this I need to recreate and resign all
  certificates of type ii) also and I'll need to redistribute the new CA
  to all clients that have this cert installed.
 
 only the cert file needs recreation and yes, all the clients will have
 to 
 have the new cert (watch out to use the same subject as well, i.e.
 create a
 new, identical certificate that only differs in the validity and serial
 number)
 
  
  ii) the certificates signed by the above CA. This are mostly 
  certificates
  for virtual hosts with my apache. I've the key-file and the 
  crt-file and even the csr-file.
  
 
 none of these need to be recreated because of the new CA certificate,
 however
 if these certs expire themselves then you also need to renew them. Same
 as before,
 only the certs need renewal - key pairs can be maintained  
 
  iii) selfsigned certificates I use for securing mailtransfer. 
  I have the pem-file in this case.
 
 same as above, create a new cert but maintain the key. But actually you
 can 
 simply reuse you expired cert as they are self-signed, you (and nobody
 else) 
 trusts your certs. All the trust is directly in your public-private key
 pair.
  
  I hope that I can extend the validity with openssl without
  recreating. 
  
 
 nope, that's what makes certificates safe. 
 
 Markus
  
 
 
  
  thnx,
  peter
  
  -- 
  mag. peter pilsl
  IT-Consulting
  tel: +43-699-1-3574035
  fax: +43-699-4-3574035
  [EMAIL PROTECTED]
  http://www.goldfisch.at
  __
  OpenSSL Project http://www.openssl.org
  User Support Mailing List[EMAIL PROTECTED]
  Automated List Manager   [EMAIL PROTECTED]
  
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
 

-- 
mag. peter pilsl
IT-Consulting
tel: +43-699-1-3574035
fax: +43-699-4-3574035
[EMAIL PROTECTED]
http://www.goldfisch.at
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: r.e. OpenSSL and MacOS (pre-OS X)

2003-02-17 Thread Aram Perez
Hi Rodney,

Rodney Thayer wrote:

 I'm trying to build OpenSSL 0.9.7 on OS X 10.2.3 with CodeWarrior.
 I tried using the 'mcp' files in the MacOS directory, but they
 don't work.  Specifically, they can't find /usr/include/sys/types.h.
 
 Short of being grumpy the compiler's too clueless to find fundamentals
 like /usr/include, anyone have any ideas?
 
 Does anyone build on OS X?  With CodeWarrior, not GNU?

I've built it with GNU on OS X. The only problem I ran into was the problem
stated in the file PROBLEMS, where OS X already has an older version of the
OpenSSL libraries.

Regards,
Aram

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: r.e. OpenSSL and MacOS (pre-OS X)

2003-02-17 Thread Rodney Thayer
At 07:15 AM 2/17/2003 -0800, Aram wrote:



I've built it with GNU on OS X. The only problem I ran into was the problem
stated in the file PROBLEMS, where OS X already has an older version of the
OpenSSL libraries.


I've done that too.  There is, by the way, a serious problem with
that workaround.  If you delete the openssl libraries from /usr/lib,
your system will never boot again.  Many things (including, apparently,
fsck or something at startup) simply silently fail to work.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



redirecting input to s_client

2003-02-17 Thread Himanshu Soni
Hi

Is there a way to redirect the GET/POST request from a file to the openssl 
s_client app? something like:

cat get.txt | openssl s_client -connect server:443 -cert crtfile -key keyfile 

The result of the above is that the program exists with DONE printed to the 
console.

I have tried the -pause switch with the above but with no luck.

Thanx in advance for any help.

Himanshu Soni 
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: r.e. OpenSSL and MacOS (pre-OS X)

2003-02-17 Thread Aram Perez
Hi Rodney,

Yes, that happened to me. I didn't delete the files, just moved them to
another directory, but then I couldn't boot. I had to boot into single user
mode, copy the files back and then I was able to reboot fine.

Regards,
Aram


Rodney Thayer wrote:

 At 07:15 AM 2/17/2003 -0800, Aram wrote:
 
 
 I've built it with GNU on OS X. The only problem I ran into was the problem
 stated in the file PROBLEMS, where OS X already has an older version of the
 OpenSSL libraries.
 
 I've done that too.  There is, by the way, a serious problem with
 that workaround.  If you delete the openssl libraries from /usr/lib,
 your system will never boot again.  Many things (including, apparently,
 fsck or something at startup) simply silently fail to work.
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: OpenSSL 0.9.6/0.9.7 library version conflicts

2003-02-17 Thread Vivek Khera
 TL == Terry Lambert [EMAIL PROTECTED] writes:

TL not being overridden, even when the library path is.  This is
TL most likely due to a bug in the GNU configure script.  The best
TL way around those bugs is do not use GNU configure.

 FYI, FreeBSD is not the only OS on which this problem has been found to
 exist. Debian Linux is experience the same problem. See a post to
 debian-devel-announce attached below.


TL FWIW: this confirms that it's a Postfix problem.

Postfix does not use GNU configure.  I'm not sure how to fix it, but
will gladly accept patches that work both with and without the openssl
port.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: OpenSSL 0.9.6/0.9.7 library version conflicts

2003-02-17 Thread Terry Lambert
Vivek Khera wrote:
  TL == Terry Lambert [EMAIL PROTECTED] writes:
 TL not being overridden, even when the library path is.  This is
 TL most likely due to a bug in the GNU configure script.  The best
 TL way around those bugs is do not use GNU configure.
 
  FYI, FreeBSD is not the only OS on which this problem has been found to
  exist. Debian Linux is experience the same problem. See a post to
  debian-devel-announce attached below.
 
 TL FWIW: this confirms that it's a Postfix problem.
 
 Postfix does not use GNU configure.  I'm not sure how to fix it, but
 will gladly accept patches that work both with and without the openssl
 port.

Then whatever it uses instead to determine platform dependencies
isn't working.

The issue is that there should be a way to specify use of a
preferred -I for include files during compilation, and a
preferred -L for library files, during linking, and that one
or both of these is missing.

-- Terry
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Making Private CA

2003-02-17 Thread Chandrasekhar R S
Hello,
I am making my own private CA, using the CA.pl scripts provided under the
apps directory of OpenSSL release.

I run ./CA.pl -newca

It asks for filename, and I enter without giving any.

I am prompted for PEM pass phase.  I enter some.

After which, I get the following error

unable to find 'distinguished_name' in config
problems making Certificate Request
28979:error:0E06D06A:configuration file routines:NCONF_get_string:no conf
or environment variable:conf_lib.c:324:

Please note that I had copied the openssl.cnf to the same directory that of
CA.pl but didn't modify any of the contents of openssl.cnf.


- rsr.

Namaste,
R S Chandrasekhar
[EMAIL PROTECTED]
ISD : 091-080-2051166
Telnet : 847-1166

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]